First of all, as it is common with TLS errors, ERR_SSL_VERSION_OR_CIPHER_MISMATCH in Chrome is in no way descriptive of a particular problem.
Next, I admit that I have never in my life touched BitDefender and especially its TLS wiretapping techniques with a ten foot pole, nor that I'd ever wanted to.
Having said that, I've seen a similar bug in similar products, so I may happen to give you a clue.
See, when a TLS interceptor sees a certificate, it copies it, replaces the certificate authority data with its own and signs it, and then sends to the browser (or whatever client software is trying to make a secure request). A basic TLS interceptor doesn't do anything else to the certificate: it doesn't, say, change subject alternative name field or mangle any other X509v3 extension value. Only the CA data is changed, the rest of the certificate is left as is.
As the CA data is changed, the subsequent OCSP staple won't obviously be valid, so the interceptor strips that data as well. In fact, it's acting as a proxy, so it doesn't strip anything, it just doesn't put a staple into the browser-facing connection even when it receives a staple from the server-facing connection, and that's it.
Now, the browser receives the certificate, signed by the interceptor, with OCSP Must Staple on it, but doesn't get a valid OCSP staple because it's not sent by the interceptor. At this point, the best your browser is able to do is to halt the TLS connection and display a cryptic error message.
NB: this is one way to break OCSP with a TLS interceptor that I'm aware of. BitDefender could be actually using another method, there are surely plenty of them.